Cyber Security News

Threat Actors Mimic Electronic Frontier Foundation To Attack Gaming Community

Cybersecurity researchers have uncovered a sophisticated campaign targeting the Albion Online gaming community through impersonation of the Electronic Frontier Foundation (EFF).

The operation, discovered in early March 2025, leverages decoy documents designed to appear as official EFF communications while deploying malware in the background.

Albion Online, a multiplayer online role-playing game with a player-driven economy, has become a lucrative target due to third-party markets where in-game assets are exchanged for real money.

Researchers at Hunt.io identified messages on the game’s forum directing players to phishing websites under the pretext of discussing security for in-game assets tied to their accounts.

The attackers employed an exposed open directory containing a mix of PDFs, ZIP archives, and PowerShell scripts, revealing their operational infrastructure.

A key component of the attack is a Windows shortcut (LNK) file named “Report-Albion-Online.lnk” which executes PowerShell with an Execution Policy Bypass to run malicious scripts.

The attack chain begins when users receive phishing messages with links to what appears to be an official EFF report titled “Electronic Report on Investigation of Virtual Asset Theft in Albion Online.”

Suspicious PDF targeting users of the Albion online game (Source – Hunt.io)

This PDF was programmatically generated and designed to create urgency by informing victims of unauthorized login attempts.

Malware Analysis

Upon execution, the PowerShell script retrieves malicious components and drops them into the victim’s system.

The script contains Russian-language comments, suggesting the involvement of Russian-speaking developers.

Besides this, one of the critical malware component, albion.exe, is a renamed legitimate Python 3.10.8 executable used to execute an accompanying script named 12.py.

This Python script contains two encoded portions that, when decoded, reveal connections to command and control servers at 104.245.240.19:443 and 212.87.222.84:443, identified as Stealc stealer and Pyramid C2 infrastructure respectively.

Communication with these servers occurs through HTTP requests such as:-

http[:]//104.245.240.19:443/login/3keXipGb5Rr+gpGO9Cj sSfdz+of5

The malware then initiates multiple POST requests to extract stored credentials from browsers before sending them back to the C2 server.

Snippet of the C2 communications as found by Triage (Source – Hunt.io)

This campaign shows that how threat actors combine legitimate organizations’ reputations with technical sophistication to target specific communities.

Users are advised to verify the authenticity of communications and exercise caution with unsolicited messages, especially those requesting immediate action.

Collect Threat Intelligence on the Latest Malware and Phishing Attacks with ANY.RUN TI Lookup -> Try for free

Tushar Subhra Dutta

Tushar is a Cyber security content editor with a passion for creating captivating and informative content. With years of experience under his belt in Cyber Security, he is covering Cyber Security News, technology and other news.

Recent Posts

GitAuto Strengthens Code Security By Automating QA At Scale

In the current software landscape, security breaches caused by untested or poorly tested code are…

26 minutes ago

Cybersecurity in Mergers and Acquisitions – CISO Focus

Cybersecurity in mergers and acquisitions is crucial, as M&A activities represent key inflection points for…

2 hours ago

Top Cybersecurity Trends Every CISO Must Watch in 2025

In 2025, cybersecurity trends for CISOs will reflect a landscape that is more dynamic and…

2 hours ago

Zero Trust Architecture – A CISO’s Blueprint for Modern Security

Zero-trust architecture has become essential for securing operations in today’s hyper-connected world, where corporate network…

2 hours ago

Chrome 136 Released With Patch For 20-Year-Old Privacy Vulnerability

The Chrome team has officially promoted Chrome 136 to the stable channel for Windows, Mac,…

3 hours ago

SecAI Debuts at RSA 2025, Redefining Threat Investigation with AI

By fusing agentic AI and contextual threat intelligence, SecAI transforms investigation from a bottleneck into…

12 hours ago